Cyber Security Analyst (CSA) - Cyber Forensic Investigator
Offered By: Udemy
Course Description
Overview
What you'll learn:
- How to Setup Practice Labs.
- How to Install Required Apps & Tools.
- How to Capture Network Traffic Packets using Wireshark.
- How to Analyze Wireshark Captured Packets.
- How to Recover Deleted Files from OS/Partition/Devices.
- Linux Forensic Investigation.
- Windows Forensic Investigation.
- Malware Analysis and Performing Reverse Engineering on Malwares.
- Handling Linux and Windows Important Inbuilt Tools.
- Perform Cyber Forensic Investigation with Practical Methods.
- Finding Malicious Processes on Windows & Linux.
- Terminating Malicious Processes on Windows & Linux.
- Analyzing Windows Security Logs.
- Linux File Transfer using Command Line.
- Setting up Netcat Listener to Get Reverse Connection Access.
- File Transfer using Netcat Listener and SimpleHTTP server.
Cyber Security Analyst (CSA) - Cyber Forensic Investigator
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Welcome to the "Cyber Security Analyst (CSA) - Cyber Forensic Investigator" course. This course is developed for security analysts who are beginners in cybersecurity. This is a fully practical course where I have explained everything from setting up the lab to perform security audits on live machines. If you have purchased our course then we are going to upload regular new content in this course so in the future you will get access to that content free of cost we are taking steps to stop piracy of this course. This course is for educational purposes only, do not try methods you learned in this course for any unethical activity.
What you will learn in this course?
How to Setup Practice Labs.
How to Install Required Apps & Tools.
How to Capture Network Traffic Packets using Wireshark.
How to Analyze Wireshark Captured Packets.
How to Recover Deleted Files from OS/Partition/Devices.
Linux Forensic Investigation.
Windows Forensic Investigation.
Malware Analysis and Performing Reverse Engineering on Malwares.
Handling Linux and Windows Important Inbuilt Tools.
Perform Cyber Forensic Investigation with Practical Methods.
Finding Malicious Processes on Windows & Linux.
Terminating Malicious Processes on Windows & Linux.
Analyzing Windows Security Logs.
Linux File Transfer using Command-Line.
Setting up Netcat Listener to Get Reverse Connection Access.
File Transfer using Netcat Listener and SimpleHTTP server.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Disclaimer: All videos and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security, and cybersecurity should be familiar subjects to anyone using digital information and computers.
Taught by
Shubham Kotwal
Related Courses
Foundations of Computer Science for TeachersThe University of Texas at Austin via edX Computer Forensics
Rochester Institute of Technology via edX FinTech Security and Regulation (RegTech)
The Hong Kong University of Science and Technology via Coursera Cyber Security
CEC via Swayam Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX